Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design for change: Information-centric architecture to support agile disaster response., and . ICC, page 4025-4029. IEEE, (2013)Disaster privacy/privacy disaster., , , , and . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)When PETs misbehave: A Contextual Integrity analysis., and . CoRR, (2023)VACCINE: Using Contextual Integrity For Data Leakage Detection., , , , , , and . WWW, page 1702-1712. ACM, (2019)Publish/Subscribe on Top of DHT Using RETE Algorithm., , and . FIS, volume 6369 of Lecture Notes in Computer Science, page 20-29. Springer, (2010)It Takes a Village: A Community Based Participatory Framework for Privacy Design., , and . EuroS&P Workshops, page 112-115. IEEE, (2018)Going against the (Appropriate) Flow: A Contextual Integrity Approach to Privacy Policy Analysis., , , and . HCOMP, page 162-170. AAAI Press, (2019)Enclosed Loops: How open source communities become datasets., , , and . CoRR, (2023)Digital Contact Tracing in the EU : Data Subject Rights and Conflicting Privacy Governance., , and . ASIST, volume 58 of Proc. Assoc. Inf. Sci. Technol., page 819-821. Wiley, (2021)Moana: a case for redefining the internet service abstraction., and . MW4NG@Middleware, page 2:1-2:6. ACM, (2014)